Substream Trading: Towards an Open P2P Live Streaming System

Size: px
Start display at page:

Download "Substream Trading: Towards an Open P2P Live Streaming System"

Transcription

1 Substream Trading: Towards an Open P2P Live Streaming System Zhengye Liu, Yanming Shen, Keith W. Ross, Shivendra S. Panwar, and Yao Wang Dept. of Electrical and Computer Engineering Dept. of Computer and Information Science Polytechnic University, NY 1121 ABSTRACT We consider the design of an open P2P live-video streaming system. When designing a live video system that is both open and P2P, the system must include mechanisms that incentivize peers to contribute upload capacity. We advocate an incentive principle for live P2P streaming: a peer s video quality is commensurate with its upload rate. We propose Substream Trading, a new P2P streaming design which not only enables differentiated video quality commensurate with a peer s upload contribution but can also accommodate different video coding schemes, including single-layer coding, layer coding, and multiple description coding. Extensive trace-driven simulations show that substream trading has high efficiency, provides differentiated service, low start-up latency, synergies among peers with different Internet access rates, and protection against freeriders. 1. INTRODUCTION BitTorrent is a remarkably popular file-distribution technology, with millions of users sharing content in hundreds of thousands of torrents on a daily basis. Fundamental to BitTorrent s success is its openness the BitTorrent protocol is published in the Internet, and the source code of the baseline implementation is made widely available. This openness has enabled developers to create over 5 independent BitTorrent client implementations [1], dozens of independent tracker implementations [2], and a multitude of torrent search sites. The openness of the protocol has further fostered open discussions in both the online developer and research communities, leading to further performance and security improvements. It has also fostered innovations in the broader BitTorrent ecosystem, including recent deployments of distributed trackers, using DHTs and gossiping, in many popular BitTorrent clients. A second key element in BitTorrent s success is, of course, its P2P design. Since BitTorrent peers assist in file distribution, a file can be distributed to an unlimited number of peers with modest initial seeding capacity. But with an open P2P design, it becomes necessary to incorporate an incentive mechanism to encourage peers to contribute upload bandwidth. Without such an incentive in an open protocol, clients can easily be written to freeride (that is download without uploading) or be configured to upload at low rates. Bram Cohen, the inventor of the original BitTorrent system, recognized the need of building into the system a simple, but effective incentive mechanism [5]. Fundamentally, BitTorrent s incentive principle is as follows: a peer will get the file faster if it contributes more upload bandwidth to the torrent. This incentivizes users to upgrade their ISP access and/or increase the maximum upload rates (typically configurable) in their BitTorrent clients. BitTorrent provides this basic incentive using the celebrated tit-for-tat algorithm [5], in which peers trade blocks of content with each other. (Although several recent studies have shown that the tit-for-tat algorithm is not sufficient for preventing free-riders or fully incentivizing users [12, 14, 19, 23], the algorithm has nevertheless been very successful in practice.) Tit-for-tat effectively creates a differentiated service at the application layer, providing high-speed uploaders with short download times and low-speed uploaders with high download times. In this paper, inspired by BitTorrent s open and P2P philosophies, we consider the design of an open P2P livevideo streaming system. Ideally, such a design would lead to an open protocol and numerous independent client, seed, and tracker implementations. Such a live P2P streaming system would also allow arbitrary users to seed live video channels including live user-generated content in much the same way that BitTorrent allows arbitrary users to seed files. Eventually, we expect much of the live content to emanate from handheld wireless devices, and may include such diverse sources as professors lectures, Little League baseball games, and political demonstrations. Recently, several P2P live video systems have been successfully deployed. They have reported phenomenal success on their Web sites, claiming tens of thousands of simultaneous users in a single channel, with stream rates between 3 kbps to 1 Mbps. These systems include CoolStreaming [32], PPLive [2, 9], PPStream [21], UUSee [25] and many more. The success of these systems shows the potential of broadcasting live video over P2P networks. However, all of these systems are closed and proprietary: the protocols are not published; independent client, seed, and tracker implementations are not possible without reverse engineering; there is no forum for discussion and criticism of the various designs; and the companies fully determine what content is distributed over their systems. As with BitTorrent, when designing a live video system that is both open and P2P, the system must include mechanisms that incentivize peers to contribute upload capacity. But unlike BitTorrent, the incentive cannot be download the file faster as there is no notion of faster downloads in live streaming. We advocate a new incentive principle for live P2P streaming, namely, peers that upload more see higher quality video. Ideally, peers that free-ride will receive

2 at best poor quality; peers that upload at a high average rate can receive maximal quality; and peers that upload at more modest rates receive moderate quality. Implicit in this incentive principle is that the system will make available different video qualities. With different video coding schemes, video quality can be defined with different criteria. In this paper we propose Substream Trading, anew P2P streaming design which enables differentiated video quality that is commensurate with a peer s upload contribution. Importantly, the substream trading framework can accommodate different video coding schemes, e.g., single-layer coding, layer coding, and multiple description coding (MDC). Moreover, the design provides a framework for an open P2P live video standard. Substream trading has the following key characteristics: Substream trading: The design uses a tit-for-tat mechanism based on substream trading. In the baseline design, peers exchange substreams on an even parity basis: if Alice gives Bob exactly n substreams, Bob will reciprocate with exactly n substreams. If peers receive more substreams and correspondingly more useful bits, they can obtain a better video quality. Thus, the more substreams a peer uploads the more substreams it receives and the better the quality. This is the basic mechanism that incentivizes users to upload more to obtain better video quality. Our final design also allows for altruistic behavior, permitting Alice to over reciprocate to Bob when she has spare upload capacity. Mesh design: Peers self-organize into a mesh as a function of their available bandwidth and content. The mesh overlay is robust and easy to manage in the highly dynamic P2P environment. Substream rather than chunk focus: Peers notify, select, request and deliver video in basic content units of substreams instead of chunks. As compared to a chunk-based pull-scheme (as in PPLive), the substream design achieves a smaller playback lag with less signaling overhead. Flexibility in video coding: The design can accommodate different video coding schemes. With single-layer video, the substreams can be generated by time division of the encoded video; while with layer coding or MDC, the substreams are the video layers or descriptions, respectively. To thoroughly investigate substream trading, we apply it on a single-layer video system and a layered video system. For both systems, the substream trading scheme can provide differentiated video quality and a high overall system performance. In this paper, we make the following contributions: We first make the simple, but critical observation that an open P2P live streaming system needs an incentive mechanism, and that the appropriate incentive for streaming is not download faster but to get better quality. We propose a new P2P streaming design, substream trading, based on a dynamic mesh network (as opposed to a tree design), and trading substreams (rather than trading chunks). To our knowledge, this is the only P2P live streaming framework that supports different video coding schemes and explicitly addresses the incentive issue. The design can be used as a framework for an open P2P live streaming system. We examine the possible integration of the proposed substream trading scheme with different video coding schemes: single-layer coding with and without simulcast, layer coding, and MDC. Using traces for peer dynamics from a real-world P2P livestreamingsystem,weevaluatetheperformanceof substream trading using both single-layer video and layered video. We show that it is self-scaling, has high efficiency, provides differentiated service, low start-up latency, synergies among peers with different Internet access rates, and protection against free-riders. The remainder of this paper is structured as follows. Section 2 discusses our fundamental design decisions. Section 3 presents the design of the substream trading system. We consider integration of the substream trading mechanism with different video coding schemes in Section 4, and delineate pros and cons of each. In Section 5, we evaluate the performance of single-layer video and layered video systems based on trace-driven simulations. We discuss related work in Section 6 and conclude in Section FUNDAMENTAL DESIGN CHOICES For a live P2P video distribution, there is a source (analogous to the initial seed in BitTorrent) and a group of peers watching the video. We refer to the source and the group of peers as a torrent. The source encodes and divides the captured video into chunks, and disseminates the video chunks into the P2P torrent. Each peer receives chunks from the source or from other peers (or from both the source and peers). The video source may only have modest upstream Internet access (perhaps less than 1 Mbps), using cable modem, DSL, Wi-Fi, or 3G wireless networks. 2.1 Tree or Mesh? There is a debate in the literature on which architecture (tree vs. mesh) is more suitable in P2P live streaming. With a tree approach, peers are organized into a single tree or multiple trees [4, 17, 3, 26]. The source pumps video chunks through the trees. The tree structure can be optimized to efficiently disseminate video chunks. However, performance with trees can suffer from peer churn, and trees can be difficult to manage in a highly dynamic P2P environment. With a mesh approach, peers self-organize into a mesh as a function of their available bandwidth and content. If there is an overlay link between two peers in the mesh, those two peers are said to be partners. In a decentralized fashion, peers form and update partnerships, and explicitly exchange content availability information with their partners. Based on this information, peers select what content to request from their partners. Currently all of the large-scale industrial deployments (PPLive, PPStream, UUSee, and so on) use a mesh design. The most important feature of the mesh approach is that the dynamic overlay is very robust to peer churn, due to the loose relationship among peers. It has further been reported that mesh overlay outperforms tree

3 or multiple tree from several perspectives [15]. We therefore adopt a mesh overlay in our design. 2.2 Chunk or Substream? With a mesh overlay, a key design consideration is what is the basic content unit for notifying, selecting, requesting and delivering. One widely adopted approach is to divide a video into chunks, with each chunk consisting 1-4 seconds of video. Such a chunk-based design reduces the dependency of a peer on a particular partner: a peer can request a chunk from any of its partners who has this chunk. This flexibility further increases the robustness of a system to peer churn. Additionally, it allows a peer to use its upload bandwidth with fine granularity. A peer with low upload bandwidth can serve a chunk to its partner, even though it may take a relatively long time. However, this chunk-based design has a playback lag and overhead trade-off [31, 11]. To reduce the playback lag, a peer has to send data availability notifications frequently; otherwise, the lag will normally be large. Recently, substream-based approaches have been proposed to mitigate this problem [31, 11]. In these proposals, the video is first divided into multiple substreams by simply time dividing a single layer video. For example, assume there are totally S substreams, substream s will contain chunks s, s+s, s+2s,..., from the coded video chunk stream. A supplier informs its partners of the substreams it has available. A receiver then determines which substreams should be obtained from which suppliers. When a supplier is assigned to send a receiver a particular substream, it forwards any received chunk belonging to this substream to the receiver immediately, without explicit chunk request notifications. This significantly reduces the playback lag. Additionally, signaling overhead is reduced by batching the notifications of chunks into substreams. As with a chunk-based mesh design, this design is robust to peer churn. The substreams can be very thin so as to efficiently use the upload bandwidth of peers. In many ways, the substream design provides the best features of trees (which have small playback lags) and chunk-based meshes (which are robust to high churn rates). In this work, we adopt the substream-based mesh approach. In [31, 11], the focus is on showing that a substream approach, where single-layer video is time-divided into substreams, can provide superior overhead and lag performance as compared with a chunk-based mesh approach. Incentives and video coding are not considered in [31, 11]. Our contribution is very different. With the ultimate goal of designing a framework for an open P2P live streaming system, we develop a tit-for-tat incentive scheme substream trading for a broad-class of substream systems, which include single-layer video, layered video, and MDC. Using real-world traces, we show that substream trading provides incentives through differentiated service. 3. SYSTEM DESIGN Our goal now is to design an open P2P live streaming system in the context of a mesh-substream design. As discussed in the Introduction, for an open design, it is critical that there be an incentive to encourage peers to upload substreams to other peers. In this section, we describe a design framework that not only provides the desired incentives, but also has the flexibility to support a variety of substream types. 3.1 Mesh Overlay with Substreams The source encodes a video into S substreams, with the rate of each substream denoted by r. The substreams can be generated by time dividing a single-layer video, by layer coding, by MDC or by some other schemes. Each substream is further divided into chunks of seconds. At any given instant of time, a peer participating in a torrent will receive a subset of the S substreams from one or more other peers in the torrent (including possibly the source); this same peer will redistribute zero or more of the substreams it receives to other peers. In order for a peer to request substreams from other peers, it needs a mechanism for discovering other peers in the torrent (a peer discovery service) and a mechanism for determining which substreams these discovered peers have. Figure 1 shows a simple mesh-substream system with one source, two substreams, and four peers. A C S B Figure 1: A simple illustration of a mesh-substream system. As with BitTorrent, peer discovery can be provided by a tracker, in which case the source and all peers participating in the torrent register with the tracker, and discover other peers in the torrent by querying the tracker. As currently done by Azureus BitTorrent clients, peer discovery can also be provided by a DHT, by gossiping peer lists, or by a combination of trackers, DHT and gossiping. The problem of peer discovery is orthogonal to the problems considered here. After a newly arriving peer P obtains a list of other peers participating in a torrent from the peer discovery service, it contacts peers on the list, searching for partners, with whom peer P establishes overlay links. For two partners, it is possible that (i) both serve substream(s) to each other; (ii) only one serves substream(s) to the other; (iii) or neither serves substream(s) to the other. Typically, a peer selects its partners based on some policy, which is referred as a partner selection problem. After having found a sufficient number of partners (on the order of the number of substreams), peer P selects substreams from its partners and the partners sequentially push the video chunks of their selected substreams to peer P. Peer P requests maps from its partners periodically, indicating what content they currently have. In BitTorrent, the maps indicate the data chunks that a peer has available for sharing. In our case, the maps indicate the substreams a peer has. For peer P, each of its partners may have more than one substream, and each substream may be available on more than one partner. Given the partners and their substream availabilities, a critical problem of peer P is therefore to determine which substreams should be obtained from which partners. We refer this problem as a substream selection problem. If a particular substream is re-assigned to the same partner, peer P will not send the request notification to that partner, and the partner keeps forwarding the chunks from the previously selected substream to peer P. From time to time, peer P may have to drop partners 1 D 2

4 that do not have sufficient upload bandwidth or video content, based on some policy. This is referred as a partnership maintenance problem. After peer P drops partners, it will try to find replacement partners from the peer list. Note that there are two time scales in this process. In the longer time scale, peers modify their partners; at the shorter time scale, with the set of partners fixed, peers select substreams from their partners. 3.2 Substream Trading The essence of our scheme is substream trading: twopartners exchange substreams with each other in a tit-for-tat fashion. In pure tit-for-tat substream trading, peer P sends n substreams to Q if and only if Q sends n different substreams to P. One simple observation is that if all peers use pure tit-for-tat, then each peer receives a number of substreams that is exactly equal to the number of substreams it uploads to other peers; thus, a peer with higher upload contribution is more likely to trade more substreams and eventually obtain better quality. But as we will soon see, pure tit-for-tat is impractical and inflexible; we will need to augment it with mechanisms that address a number of critical issues. In the following sections, we explore these issues in detail. Peer P and peer Q may trade only one substream (single substream trading) or more than one substream (multiple substream trading) with each other. Multiple substream trading can be considered as a set of single substream trading. For example, if peer P trades two substreams with peer Q, then for peer P, peer Q can be considered to be two virtual partners, Q1 and Q2. P trades only one substream with each of the two virtual partners. If the partnership between P and one of the virtual partners breaks up, then peer P and peer Q will simply reduce to the single substream trading. For this reason, in the following sections, we discuss the proposed schemes based on single substream trading Partner selection Recall that the video is encoded into S substreams at the source. We denote the configured maximum upload rate of peer P as bandwidth C, which varies from peer to peer. To simplify notation, assume throughout that C is a multiple of r. Thus, the peer is able to trade up to T =min(c/r, S) substreams. When a peer is trading less than T substreams and has spare bandwidth, it will search for additional partners for trading. When peer P meets another peer Q that also has spare bandwidth, the two peers should decide whether to establish the partnership. These two peers can simply agree on forming a partnership without a specific policy. However, after forming the partnership, these two peers may not be able to trade substreams properly. For example, in a layered video system, a high bandwidth peer cannot trade with a low bandwidth peer for a high video layer. To avoid establishing a partnership with an unsuitable partner, peer P may have to pre-screen the candidates before forming the partnership. To this end, peer P can precheck the substream availability of the candidate peer Q, by requesting the substream map from peer Q. Since substream trading is a two-way process and both peer P and peer Q have to make such a decision, they exchange their substream maps for partner selection. With the substream maps from peer Q and its existing partners, peer P can decide whether peer Q can introduce additional substreams or not. This is achieved by using a substream selection algorithm that will be described in Section 3.3. If both peer P and peer Q have at least one needed substream for each other, they will select each other as partners. If not, they have to decide whether to form a partnership. For peer P, if peer Q does not have any substream that peer P needs currently, it does not necessarily mean that Q is not a suitable partner of P. This is because peer Q may obtain the needed substreams of P after a while, from its other partners. There is a dilemma here. If they select each other as partners, they cannot trade immediately; if they don t form a partnership and keep searching, it may be possible for both of them to find partners for immediate trading, but that is costly in terms of time and overhead. Thus, peer P and peer Q should make a decision whether to form a partnership, if they cannot trade substreams immediately. We make the observation that a peer with fewer substreams, and accordingly less ability for trading, has higher motivation to form such a partnership. This is because a peer with less substreams available may take a long time to find a partner that needs its substreams and form an immediate trading partnership. Following this philosophy, we propose a simple scheme, which we will use in our trace-driven simulation analysis of substream trading. Assume that peer Phass P substreams and peer Q has s Q substreams. In this scheme, peer P (peer Q) agrees to form a partnership with probability p P (p Q). If both peer P and peer Q agree on forming a partnership, they will establish the partnership; otherwise, they search for new peers. In this scheme, p X (X represents P or Q) is simply given by: p X =( S sx ) γ, (1) S where γ is a control parameter. Note that a newcomer with s X = always agrees on forming such a partnership, since it does not have any substream to trade Partnership maintenance After peer P and peer Q form a partnership, they request substream maps and select substreams from each other. After substream selection, it is possible that peer P and peer Q enter into a non-trading relationship, i.e., not both partners have the needed substreams by each other. In our design, if only peer P has a substream that peer Q wants, peer P will deliver it for free. This shares some similarities with optimistic unchoke in BitTorrent, where a peer uploads without requiring reciprocation. It addresses the situation where a peer is willing to contribute to the system but does not have any start-up content. If P and Q cannot transfer from the non-trading relationship to a trading relationship (i.e., both partners have the needed substreams available by each other) within a time threshold W n seconds, they will break the partnership. Both peer P and peer Q periodically request substream maps and re-select substreams from each other. For partners with a trading relationship, both of them monitor the trading procedure with each other. We use a double-sliding window approach to evaluate a partner s performance. With this approach, the peers count the number of downloaded chunks and correspondingly calculate the download rates from their respective partners within each of the two time sliding windows, with one being shorter than the other. Denote the lengths of the sliding windows to be

5 W s and W l,wherew s <W l. We denote the download rates within the two sliding windows as r s and r l, respectively. If a partner serves constantly, both rates r s and r l should be equal to r. However, due to Internet jitter or a temporary content deficiency, a partner may not be able to deliver with arater constantly, especially over a short time scale. To handle this, we introduce tolerance factors for both sliding windows, and consider a partner to provide sufficiently good service quality if r s α r and r l β r. Theshorterwindow is used to detect a highly incapable or uncooperative partner quickly. It typically needs a smaller tolerance factor α, e.g., α =.5. The larger window is used to detect long-term bandwidth or content deficiency. Since time W l is long enough to smooth out Internet jitter, β should be close to 1.. If a peer detects that a partner cannot pass the double-sliding window test, it will seek a replacement partner. 3.3 Substream Selection P1 P2 P3 (1,11,94) (11,94,1) P (95,12,95) (98,97,96) (a) P1 P2 P3 (1,1,) (1,,1) (,1,) (b) Figure 2: (a)substream maps; (b)abstracted substream maps. In our substream trading system, a peer should determine that which substreams should be obtained from which partners. Before substream selection, the peer periodically requests substream maps from all its partners. Figure 2(a) shows the typical substream maps of peer P and its partners P1, P2, and P3. As an example, the substream map of P1 indicates that it has three substreams, and the sequence numbers of the last chunks from substreams 1, 2, 3 are 1, 11, 94, respectively. Assume that there is no chunk loss during the transmission (e.g., by using the TCP connections for chunk delivery, or by inserting sufficient FEC chunks), the sequence number of the last chunk is sufficient to indicate the chunk availability of a particular substream. For P1, although it has three substreams available, only substreams 1 and 2 can be pulled by peer P, since peer P already has more chunks from substream 3 than P1. Thus, in Figure 2(b), only substreams 1 and 2 are indicated as available in P1. Note that this automatically eliminates possible loops while delivering a substream in a mesh network. We record this processed data availability of partners in abstracted substream maps, as shown in Figure 2(b). With the above definition, we can formulate the substream selection problem as an optimization problem. Assume a peer has N partners 1,...,N for requesting substreams. The set of available substreams in partner n is defined as S n.let x sn = 1 denote that substream s is received from partner n. Since a partner can send at most one substream to a peer (with the virtual partner definition), x sn is subject to the following constraint: x sn 1, n =1,...,N. s S n P Furthermore, since a substream only needs to be sent from one partner, we have the following constraint as well: x sn 1, s =1,...,S. n By substream selection, a peer tries to maximize the received video quality. With different video coding schemes, the importance of each substream could be different. For example, with single-layer coding and MDC, the substreams have equal importance, and the peer only needs to maximize the number of received substreams; while with layer coding, the substreams have unequal importance, and the peer needs to take into account the importance of different substreams and maximize the received video quality. To reflect the importance of substreams, we assign weights to each substream, with a larger weight indicating a more important substream. With these weights, the optimal substream selection problem can be converted to maximizing the weighted sum of all substreams as follows: max s.t S w sx sn s=1 x sn 1, n =1,...,N, s S n x sn 1, s =1,...,S, (2) n where w s denotes the weight of substream s. This is the classical maximum weight matching problem in a bipartite graph as shown in Figure 3, which can be solved with a complexity of O(S 3 ) [6]. We will give examples of an appropriate assignment of weights for single-layer video and layered video in Section 4. Partner 1 Partner 2 Partner N... Substream 1 Substream 2... Substream S Figure 3: A bipartite graph representing the substream selection algorithm. 3.4 Altruistic Peers A peer is altruistic at any given time if its aggregate upload rate is higher than its aggregate download rate. With the presence of altruistic peers, bandwidth-deficient peers can possibly receive video at rates higher than their contributions. We do not force a peer to donate bandwidth. We assume that a bandwidth-rich peer will only consider donating if it is receiving all substreams (i.e., the full video rate) and still has surplus upload bandwidth. Assume a peer is willing to contribute upload bandwidth C where C/r > S. This peer can donate C/r S substreams, i.e., it can provide other peers substreams without reciprocation. In our design, it is the benefactor that determines who will be its beneficiaries. For simplicity, an altruistic peer can randomly select its beneficiaries. A biased donation can also be used. For example, the benefactor can first donate the substreams to its existing partners, and then other peers.

6 As we will see in Section 5, such a biased scheme helps to combat free-riders. 4. VIDEO CODING In this section, we show how substream trading can be applied to a variety of different video coding schemes, including single-layer video, layered video, MDC, and simulcast. 4.1 Single-Layer Video Let us first consider single-layer video, which is currently used by most P2P video applications, including all the popular live P2P industrial deployments, such as PPLive, PP- Stream, and Coolstreaming. Single-layer video is widely adopted because of its high coding efficiency and its simple design. With single-layer video, a video is time-divided into S substreams each of rate r. If a peer receives all S substreams, it can reconstruct the video perfectly; otherwise, the peer will reconstruct a corrupted video due to losses of video chunks. One approach to conceal the loss is to simply repeat the latest correctly reconstructed video frame until a new video frame can be reconstructed correctly. (This usually occurs when chunks containing the next I-frame are received, where I-frames are frames that are coded without referencing to previous frames.) This leads to frame freeze and discontinuous video playback. With substream trading, if the upload bandwidth of a peer is higher than the video rate, it can trade all substreams and obtain a continuous video playback; otherwise, it can only trade part of substreams and obtain a less continuous video playback. This provides the basic incentives for peers to contribute upload bandwidth. Note that not all peers in a single-layer system are necessarily self-supported, with an upload bandwidth higher than the video rate. If no peer contributes at a rate higher than the video rate, the peers with low upload bandwidth cannot receive all S substreams. This may discourage such peers from using the application. But as in BitTorrent, where peers do not always immediately quit after receiving the entire file, we expect to see some altruistic behavior in P2P live streaming [3]. With single-layer video, substreams have equal importance. Thus, the weight for each substream for selection can be defined as w s =1,s =1,...,S. 4.2 Layered Video Layer coding encodes a video into several layers with nested dependency, i.e., layer n is only useful if layers 1 through n 1 are all available. More received layersreconstructthevideo with higher fidelity in terms of amplitude/temporal/spatial resolutions. Layered video has been suggested for many multimedia client-server applications, mainly to address the bandwidth heterogeneity of the receivers, and the temporal variation of the sustainable receiving rate, due to either Internet congestion or wireless channel fading. However, to date, there has been no widely deployed network application that uses layered video. The primary reason for this is that the original layered codecs were much less efficient than the corresponding single-layer codec to achieve the same video quality, layered video required a substantially higher bit rate than single-layered video. In recent years, significant advances have been made in layer coding. Now H.264/SVC (layer coding) achieves a ratedistortion performance comparable with H.264/AVC (singlelayer coding), with the same visual reproduction quality typically achieved at +/- 1% bit rate [29]. It is reported that a real-time system with H.264/SVC encoder and decoder has been successfully implemented [28]. Thus, thanks to these recent advances, layer coding is a viable candidate for P2P live streaming systems. Furthermore, layered video is a particularly useful concept for P2P, even more so than for client-server. In P2P, layered video responds to heterogeneous upload rates as well as heterogeneous download rates and congestion. With substream trading, a peer with a higher upload contribution will trade more layers and consequently obtain a better video quality. Furthermore, with layered video, even a small number of layers can lead to passable video quality without discontinuity. Peers with low upload bandwidth can therefore be self-sustaining and less dependent on altruistic peers. To reflect the layer dependencies, the weights for substream for selection can be set to w s =2 S s, s =1,...,S. With these weights a lower layer is more important than the sum of all its upper layers, which is consistent with layered coding. 4.3 MDC Like layered video, MDC generates multiple substreams. But unlike layered video, each of the substreams is of equal importance, so that video quality is only a function of the total number of substreams received and not of which substreams are received. Because all substreams have equal importance, designing a P2P live streaming system using MDC (rather than layered video) is appealing and more straightforward. A number of recent papers have investigated combining a large number of MDC substreams with P2P to create P2P video streaming systems [3, 17, 24, 16]. Like layered video, the proposed substream trading can be appliedwithmdc.inthiscase,thew s for each description should be equal. The efficiency of MDC depends on the trade-off among the achievable qualities with different number of descriptions [27]. MDC is inherently inefficient when a large number of descriptions are created. Among the few proposed methods for generating a large number of descriptions (> 4), MD- FEC [22] together with scalable video coding, and temporal subsampling [8], both introduce significant (> 6%) overhead, compared with single-layer video. The inefficiency of MDC largely prevents its usage in practical P2P live streaming systems. For this reason, we do not further consider MDC in this paper. 4.4 Simulcast With simulcast, the video source encodes a video into multiple independent streams by using single-layer coding, with each stream having a different rate. Each stream then gets distributed within a separate torrent, with no interaction among the torrents. Compared to layered video, simulcast requires more source bandwidth. For example, a set of 5 video simulcast streams, from 2 kbps to 1 Mbps with a 2 kbps step size, would minimally require 3 Mbps at the source; the corresponding layered design would minimally require 1 Mbps. When the sources are residential broadband connections, this becomes a critical issue. When the sources have a sufficient upload capacity to support several

7 Number of users : 22: 2: 6: 1: 14: Time Figure 4: Evolution of number of users viewing a TV channel in the PPLive network. torrents, the substream trading can be applied within each torrent, as discussed in the single-layer video system. However, such a design would suffer from lack of sharing across the simulcast streams, as we briefly discuss in Section TRACE-DRIVEN SIMULATION We conduct extensive simulations to evaluate the performance of the single-layer system and the layered system with substream trading. We also investigate the impact of cheating behavior. 5.1 Simulation Setup We developed a packet-level discrete-event simulator in C++. With this simulator, all actions are performed at the packet-level, including the video chunk flow and signaling between peers. In our simulations, we assume that the endto-end bandwidth bottleneck is at the access links and not in the Internet core. We do not simulate the delay induced by routing in the Internet core; instead, we randomly assign the end-to-end propagation delay between each pair of peers to be between tens of milliseconds to hundreds of milliseconds. Such an abstraction speeds up the simulation and we believe it can still give us an accurate evaluation of the system. Although real Internet experiments in principle could provide more accurate evaluations, it is difficult, if not impossible, to have a controllable environment that can support a large number of concurrent residential peers, which is a key design consideration in P2P networks. Peer dynamics are simulated by traces collected from a real-world P2P live streaming system PPLive [2, 9]. The traces record the arrival and departure times of the users for different channels. We select the trace of a popular Chinese TV channel, CCTV3, to drive our simulations. This one-day trace was collected from Nov 22nd 17:43, 26 to Nov 23rd 17:43, 26, and there were totally more than 1, video sessions during this period. Figure 4 shows the evolution of number of users viewing this channel. This trace covers a variety of typical scenarios in P2P live video networks, such as small systems (less than 2 concurrent users), large systems (more than 9 concurrent users), short video sessions (shorter than one minute), long video sessions (longer than 16 hours), and flash crowds. In our simulations, the upload bandwidth of the source is set to 2 Mbps. The upload capacities of peers are assigned randomly according to the distribution of Table 1. To come up with an accurate bandwidth distribution of Internet users, we jointly consider the measurement studies in [1] and [7]. The overall distribution of residential peers and Ethernet peers is obtained from [1], while the detailed bandwidth distribution of residential peers is obtained from [7]. We exclude modem peers and ISDN peers due to their low upload and download capacities. Note that the upload capacities of Internet users are highly heterogeneous. Because peers may not be willing to contribute their entire upload bandwidth, in our simulations we assume that the peers only contribute portions of their upload bandwidth for trading, which are indicated in Table 1. For example, the 256 kbps peers contribute 15 kbps for trading. The playback lag between the peers and the source is set to ten seconds. Every one second, a peer exchanges substream maps with its partners. Accordingly, the peer reselects the substreams based on the most recent substream maps. The substream maps and request notifications can be piggy-backed in the video chunks. The tolerance period W n for the non-trading relationship is set to ten seconds. We set the monitoring sliding window W s and W l to 1 seconds and 3 seconds, and set the tolerance rate factors α and β to.5 and.9, respectively. In a layered system, it is less likely for two partners in a non-trading relationship to switch to a trading relationship. Parameter γ in (1) is therefore set to one for the single-layer system and is set to three for the layered system. In our simulations, a peer can at most contact eight peers to check if they are the suitable partners during one second. If we let a peer contact more peers simultaneously, it can locate the partners faster. But this will introduce higher overhead. 5.2 Single-Layer System In this section, we investigate the substream trading system with single-layer video. We begin by assuming all peers in the system follow the proposed protocol, without tampering with the protocol to maximize their own benefits. We then consider free-riding and cheating behavior of peers Differentiated services We evaluate the single-layer video system in two scenarios. In the first scenario, the system is underloaded and the supplied bandwidth (i.e., average upload bandwidth of the entire system) is higher than the demanded bandwidth (i.e., the video rate). In the second scenario, the system is overloaded and the supplied bandwidth is lower than the demanded bandwidth. To represent video continuity, we introduce received chunk ratio, which is defined as the ratio between the number of received video chunks and the number of encoded video chunks. With the upload bandwidth distribution shown in Table 1, the average contributed upload bandwidth in the system is about 54 kbps. To investigate both the underloaded and overloaded scenarios, we consider two video rates, 5 kbps and 7 kbps. The encoded videos are time divided into 1 and 14 substreams, respectively, with the rate of each substream being 5 kbps. Each chunk has a size corresponding to = 25 ms. We assume all peers become altruistic if they obtain the video at the full rate. In our simulations, the altruistic peers prefer to donate first to their trading partners. In Figure 5, we show the CDF of the received chunk ratio for different upload bandwidths. From the ten types of peers (see Table 1), five types of peers are shown in the

8 Table 1: Peer upload bandwidth distribution (kbps) Total upload bandwidth (kbps) > 3 Distribution (%) Contributed upload bandwidth Received chunk ratio (a) Received chunk ratio (b) Figure 5: Cumulative distribution of received chunk ratio. (a) Underloaded scenario; (b) Overloaded scenario. figure, including the peer type with the lowest upload bandwidth (256 kbps), the peer type with the highest upload bandwidth (> 3 kbps), the peer types with modest upload bandwidth and with many peers (448 kbps and 124 kbps) and the peer type with the fewest peers (64 kbps). Figure 5(a) shows the results of the underloaded scenario. We observe that almost all peers have a high received chunk ratio that is close to 1., indicating that all peers can receive a continuous video quality. But we emphasize that the video qualities of the low bandwidth peers are highly dependent on the altruistic behavior of the high bandwidth peers. Figure 5(b) shows the CDF of the received chunk ratio under the overloaded scenario. In this case, the upload bandwidth in the system cannot support the video rate for all peers. On average, each peer can at most receive 77% (54/7) of the video chunks. This means that some peers will have very discontinous video quality. With our substream trading design, the peers that have an upload contribution higher than 7 kbps are self-supported and receive continuous video quality. This is verified in the figure, where the peers with 124 kbps and higher upload bandwidth can receive almost all video chunks. For the peers whose upload contribution is lower than 7 kbps, the received chunk ratio increases with their upload contribution. This incentivizes Received chunk ratio Figure 6: Cumulative distribution of the received chunk ratio for free-riders. peers to contribute more upload bandwidth Free-riding and cheating We now consider free-riding and cheating behavior. As observed in BitTorrent, uncooperative users may tamper with the BitTorrent protocol to maximize their downloading speed [3]. Similarly, in an open P2P live streaming system, a free-rider may try to receive the same video quality as regular peers with minimum upload bandwidth. An open P2P live streaming system should be able to discourage freeriding, by providing minimum video quality for free-riders. We assume the free-riders try to receive the video rate without contributing any upload bandwidth. In our simulations, we consider one type of cheating, where the free-riders untruthfully announce that they have high upload bandwidth for trading but do not have any content currently. In another words, a free-rider is always pretending to be a newcomer to the system. It is possible for free-riders to establish a partnership with a non-trading relationship with other peers and get served for free during the tolerance time W n, and then keep jumping around and cheating. We now examine whether a free-rider can receive good video quality under the overloaded scenario. In our simulations, we randomly select 1% of peers as free-riders and assume freerider establishes partnerships with up to 14 peers. Figure 6 shows the CDF of the received chunk ratio of the free-riders. We observe that even with cheating, the free-riders get a very low received chunk ratio. Several features of our design assist to discourage free-riders. First, since a free-rider has no content and bandwidth to trade, it will be dropped by its partners after W n seconds. Second, after a free-rider is dropped, it cannot find replacement partners quickly. As defined in (1), a peer with more substreams available has a lower probability of forming a partnership with a non-trading relationship with another peer. The free-rider will typically need to try several times to find a new partner. With the above two features, it is unlikely for free-rider to simultaneously find a large number (e.g., 14) of partners and receive the full video rate. Furthermore, since altruistic peers prefer to donate spare bandwidth to

9 2 1 Number of layers Time (sec) R (kbps) Figure 7: Behavior of typical peers. their trading partners, it is less likely of a free-rider to get the donation. Additionally, compared with a regular peer, a free-rider has much higher overhead of searching partners and maintaining partnerships. We nevertheless acknowledge that it may be possible for a free-rider to obtain an acceptable chunk ratio if it continuously establishes partnerships with many peers ( 14). This will come at the cost of increased overhead. This situation is similar to BitTorrent [12, 14, 19, 23], it appears impossible to fully defend against free-riders in a single-layer system. However, for layered system, we will see even greater robustness to free-riders Summary of single-layer system The single-layer video substream trading system has the following properties: In an overloaded system, where it is not possible for all peers to get acceptable quality, the peers that upload at rates higher than the video rate do receive all substreams and have maximal quality. In an underloaded system where some peers have upload capacity lower than the video rate and others higher than the video rate, the system provides maximal quality to all peers, provided that the high-capacity peers are altruistic. Unless free-riders are extremely zealous about cheating, free-riders obtain poor-quality video. 5.3 Layered System We now investigate substream trading with layered video. In our simulations, the video is encoded into 2 layers, with each layer being 5 kbps and the full video rate being 1 Mbps. For this system, since each peer has a maximum upload rate of 1 Mbps or less, none of the peers can be altruistic Differentiated service Figure 7 shows the number of decodable layers of five randomly selected video sessions during their first 2 minutes. We observe that each peer receives a number of layers that is commensurate with its upload contribution. All peers reach a stable state within 1 seconds. Once a peer reaches its stable state, the video quality is generally smooth, without significant variation. Figure 8 shows the CDF of the received video rates across all video sessions. We observe that almost all peers receive a Figure 8: Cumulative distribution of average useful download rate. video rate that is commensurate with their upload contributions. This demonstrates that substream trading provides differentiated services in a layered video system. Furthermore, the system has no bias for the different peer types. For example, the peers with 64 kbps upload bandwidth, which only make up 1.4% of the peer population, also obtain a video quality that is commensurate with their upload contributions Video quality The received video rate can largely determine the received video quality. However, in addition to a high received video rate, it is desirable to receive continuous and smooth video quality. Unlike single-layer coding, which needs to receive the full video rate to decode and play a video, layer coding can provide basic video quality if only the base layer is received. For simplicity, we assume the base layer is fully encapsulated in layer 1, and a discontinuity occurs only if the video chunks of layer 1 cannot be received correctly. In our simulation, we observe that all video sessions receive more than 99.99% of video chunks from layer 1; thus, the peers rarely experience playback discontinuity. With layered video, a receiver may receive varying number of layers, which degrades the user experience. We introduce a smoothness index to evaluate video smoothness in our simulations. The smoothness index is defined as follows: Φ= 1 t 1 t i=2 a(i) a(i 1), (3) a(i 1) where a(i) is the number of received layers in time slot i, and t is the duration of a video session in terms of time slots. The smoothness index indicates how frequently and dramatically the number of received layers is changing. When Φ is larger, the video is less smooth. In our simulations, we set the length of a time slot equal to the chunk duration. Figure 9 shows the CDF of the smoothness index of the selected video sessions. We observe that the smoothness index is very low for all peer types. (A smoothness index of.5 is extremely low, and most peers have an index much lower than.5.) This verifies that peers receive very smooth video quality, which can also be observed in Figure 7. Note that although the highest upload bandwidth peers have slightly larger smoothness index, this does not mean these users see more variation of video quality than the low bandwidth peers. When a large number of layers is received on average, the quality is already very good and

10 Smoothness index Lower Equal Higher Upload bandwidth of peers (kbps) Figure 9: Cumulative distribution of the smoothness index Layered Single Layer Start up delay (sec) Figure 1: Cumulative distribution of start-up delay across all video sessions. having slightly more or less number of layers does not produce as much variation in video quality, as in the case where on average a low number of layers are received Start-up delay In P2P live streaming, start-up delay is the time from when a channel is selected until actual playback starts on the screen. This is a critical performance issue, particularly for users who do a lot of channel surfing. Before playback can begin, a peer needs to build an initial reservoir of video chunks to deal with Internet jitter and peer churn. With single-layer video, a peer needs to build the initial reservoir for all substreams; but with layered video, the peer only needs to build the initial reservoir for layer 1. In our simulations, if a peer finishes building the reservoir of video chunks for the next three seconds, it starts decoding and playing the video. Figure 1 shows the CDF of the start-up delay for both the single-layer video system (with 5 kbps video rate) and layered video system. We observe that the start-up delay of the layered video system is significantly shorter than that of the single-layer video system. This is because with layered video, only layer 1 is needed to build the initial reservoir and provide passable video quality Interaction across peer types A natural question is whether the resulting layered system essentially creates a stratified system, where peers of the same type primarily share among each other and do not share with peers of other types. To explore this issue, for each peer, we record the download traffic from peers that have higher upload bandwidth (denoted as Higher), peers Figure 11: Interaction across peer types. that have the same upload bandwidth (denoted as Equal), and peers that have lower upload bandwidth (denoted as Lower), and normalize by the peer s total download traffic. We average these values over all peers with the same upload bandwidth, and plot them in Figure 11. We observe that for all five types of peers, there exists a large amount of interaction across peer types. This is especially true for the peer types that have relatively few members, e.g., the peers with 64 kbps upload bandwidth. Recall that with simulcast, peer types are separated into different simulcast torrents and there is no interaction across peer types. P2P live streaming with layer trading, however, as shown in Figure 11, provides major synergies across peer types. For example, a low-bandwidth peer may serve a highbandwidth peer with a lower layer. More importantly, with layer trading, a peer type with a small number of members can easily find partners outside its type for trading. This can greatly improve the overall quality of service for the system Free-riding and cheating We investigate free-riding and cheating in the layered video system. We consider the same type of cheating as discussed in the single-layer video system. In order to receive the full video rate (1 Mbps), a free-rider attempts to locate 2 partners simultaneously. Figure 12 shows the video quality of free-riders in the layered video system. Figure 12(a) plots the behavior of a typical free-rider. We observe that freeriders rarely receive video at an average rate higher than 2 kbps. Figure 12(b) shows the CDF of the smoothness index of the free-riders. Most free-riders have a smoothness index that is ten times higher than that of the regular peers, which verifies that the free-riders receive very variable video quality. This is because the free-riders are frequently dropped by their partners. On average, a free-rider is dropped by one of its partners every.6 second, leading to a high overhead for locating and managing partners. The low video quality and high overhead cost should largely discourage free-riders. With our proposed partner selection mechanism, it is less likely for a free-rider to establish partnerships with high upload bandwidth peers. Even though a free-rider can locate a large number of partners, most of these partners will be low upload bandwidth peers. With layered video, since these partners only have lower layers, the free-rider can only obtain the lower layers and consequently low video quality. Therefore, the layered system is more robust to free-riders Summary of layered video system The layered video substream trading system has been

11 Number of layers Time (sec) (a) Smoothness index (b) Figure 12: Video quality of free-riders. (a) Behavior of typical free-riders; (b) Cumulative distribution of smoothness index. shown to have many desirable properties: It provides differentiated service the video quality that a peer receives is commensurate with its upload rate. Thus peers have an incentive to upload as much as they can. For non-freeriding peers, there is little variation in video quality due to fluctuations in the received number of layers. The start-up delay is small, and significantly shorter than the start-up delay of single-layer system. Peers in different upload bandwidth categories synergistically share layers with each other. Aggressive free-riders receive the video at a low rate with relatively high quality fluctuations. 6. RELATED WORK Over the past few years, there has been a number of proposals for live P2P video in the research community [4, 17, 3, 26, 32]. None of these papers, however, addresses built-in (tit-for-tat) incentives or the design of open P2P streaming systems. Within the context of cooperative peers, Sung et al. have recently proposed an MDC-based multiple-tree scheme that uses a novel taxation scheme to provide differentiated services [24]. However, this proposal does not include built-in incentives, assumes cooperative peers, and furthermore uses MDC encoding (which is inherently inefficient as discussed in Section 4.3). There are three very recent proposals on using tit-for-tat incentives in the context of P2P live video streaming. In a workshop paper, we proposed a tit-for-tat scheme for layered video for chunk-based systems [13]. The scheme proposed in this paper has several advantages over that in [13]. First, in this paper we trade substreams rather than chunks, which significantly reduces playback lag and overhead. Second, the framework of this paper can be applied to a variety of coding schemes, including layer coding, MDC, and singlelayer coding. Mol et al. propose an MDC-based multipletree scheme that employs tit-for-tat incentives [16]. Each description is distributed over a separate tree, and peers belonging to different trees exchange descriptions with each other. This approach is based on MDC (which is inherently inefficient), cannot be easily adapted to layered video or single-layer video, and restricts a peer to trade only the description corresponding to the tree to which it belongs. Finally, Pianese et al. propose a chunk-based mesh-pull scheme with single-layer video [18]. The scheme applies a combination of tit-for-tat and donation strategies to provide incentives. In particular, peers with higher upload contribution have more buffered data and are more robust to peer dynamics. However, this scheme is limited to single-layer video and has low throughput. Unlike [13] [16] [18], the current proposal provides a framework for providing incentives in live P2P video streaming systems. This framework can accommodate a variety of coding schemes. Furthermore, the framework has been optimized for performance, providing differentiated service, high throughput, resiliency to churn, and short start-up delays. Theschemeproposedherecanserveasablueprintforan open P2P live video streaming system. 7. CONCLUSION We have argued that built-in incentives are critical for the design of an open P2P live video streaming system. In this paper, we proposed a framework with live video streaming which has built-in incentives and can accommodate a variety of video coding schemes. In particular, we have shown that substream trading with layered video has many desirable properties, including differentiated service, short start-up delays, synergies across peer types, and protection against free-riders. We are currently in the process of developing an opensource client that employs substream trading; it can be used with either layered video or with single-layer video with multiple substreams. 8. REFERENCES [1] client. [2] [3] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony Rowstron, and Atul Singh. SplitStream: High-bandwidth content distribution in a cooperative environment. In IPTPS, Berkeley, February 23. [4] Yang-Hua Chu, Sanjay G. Rao, and Hui Zhang. A case for end system multicast. In ACM SIGMETRICS, Santa Clara, June 2. [5] Bram Cohen. Incentives build robustness in BitTorrent. In Workshop on Economics of

12 Peer-to-Peer Systems, Berkeley, June 23. [6] Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. Introduction to algorithm. MIT press, 2. [7] Marcel Dischinger, Andreas Haeberlen, Krishna P. Gummadi, and Stefan Saroiu. Characterizing residential broadband networks. In ACM IMC, San Diego, October 27. [8] Frank H.P. Fitzek, Basak Can, Ramjee Prasad, and Marcos Katz. Overhead and quality measurements for multiple description coding for video services. In WPMC, September 24. [9] Xiaojun Hei, Chao Liang, Jian Liang, Yong Liu, and Keith W. Ross. A measurement study of a large-scale P2P IPTV system. In IEEE Trans. on Multimedia, volume 9, December 27. [1] Cheng Huang, Jin Li, and Keith W. Ross. Can Internet VoD be profitable? In ACM SIGCOMM, Kyoto, August 27. [11] Bo Li, Susu Xie, Gabriel Y. Keung, Jiangchuan Liu, Ion Stoica, Hui Zhang, and Xinyan Zhang. An empirical study of the Coolstreaming+ system. In IEEE JSAC, volume 25, December 27. [12] Nikitas Liogkas, Robert Nelson, Eddie Kohler, and Lixia Zhang. Exploiting BitTtorrent for fun (but not profit). In IPTPS, Santa Barbara, February 26. [13] Z. Liu, Y. Shen, S. Panwar, K. W. Ross, and Y. Wang. Using layered video to provide incentives in P2P streaming. In ACM SIGCOMM P2P-TV, Kyoto, August 27. [14] Thomas Locher, Patrick Moor, Stefan Schmid, and Roger Wattenhofer. Free riding in BitTorrent is cheap. In ACM HotNets 26, Irvine, November 26. [15] Nazanin Magharei, Reza Rejaie, and Yang Guo. Mesh or multiple-tree: A comparative study of live P2P streaming approaches. In IEEE INFOCOM, Anchorage, May 27. [16] Jan David Mol, Dick H. P. Epema, and Henk J. Sips. The Orchard algorithm: Building multicast trees for P2P video multicasting without free-riding. In IEEE Trans. on Multimedia, volume 9, December 27. [17] Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, and Kunwadee Sripanidkulchai. Distributing streaming media content using cooperative networking. In ACM NOSSDAV, Miami, May 23. [18] Fabio Pianese, Diego Perino, Joaquin Keller, and Ernst W. Biersack. PULSE: an adaptive, incentive-based, unstructured P2P live streaming system. In IEEE Trans. on Multimedia, volume 9, December 27. [19] Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. Do incentives build robustness in BitTorrent? In NSDI, Cambridge, April 27. [2] PPLive. [21] PPStream. [22] Rohit Puri and Kannan Ramchandran. Multiple description source coding using forward error correction codes. In Asilomar Conference on Signals, Systems and Computers, Pacific Grove, October [23] Michael Sirivianos, Jong Han Park, Rex Chen, and Xiaowei Yang. Free-riding in BitTorrent networks with the large view exploit. In IPTPS, Bellevue, February 27. [24] Yu-Wei Sung, Michael Bishop, and Sanjay Rao. Enabling contribution awareness in an overlay broadcasting system. In ACM SIGCOMM, Pisa, September 26. [25] UUsee. [26] Vidhyashankar Venkataraman, Paul Francisy, and John Calandrino. Chunkyspread: Heterogeneous unstructured tree-based peer-to-peer multicast. In IEEE ICNP, Santa Barbara, November 26. [27] Yao Wang, Amy R. Reibman, and Shunan Lin. Multiple description coding for video delivery. In Proceedings of the IEEE, volume 93, January 25. [28] Mathias Wien, Renaud Cazoulat, Andreas Graffunder, Andreas Hutter, and Peter Amon. Real-time system for adaptive video streaming based on SVC. In IEEE TCSVT, volume 17, September 27. [29] Mathias Wien, Heiko Schwarz, and Tobias Oelbaum. Performance analysis of SVC. In IEEE TCSVT, volume 17, September 27. [3] Manaf Zghaibeh and Kostas G. Anagnostakis. On the impact of P2P incentive mechanisms on user behavior. In NetEcon+IBC, San Diego, June 27. [31] Meng Zhang, Qian Zhang, and Shi-Qiang Yang. Understanding the power of pull-based streaming protocol: Can we do better? In IEEE JSAC, volume 25, December 27. [32] Xinyan Zhang, Jiangchuan Liu, Bo Li, and Tak-Shing Peter Yum. DONet: A data-driven overlay network for efficient live media streaming. In IEEE INFOCOM, Miami, March 25.

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

A Fast Channel Switching System for IPTV based on Multi-channel Preview

A Fast Channel Switching System for IPTV based on Multi-channel Preview A Fast Channel Switching System for IPTV based on Multi-channel Preview Tein-Yaw Chung, Cheng-Li Hsieh, Hsiao-Yi Wang, Chung-Yu Hsu, Fong-Ching Yuan Departments of Computer Science and Engineering Yuan

More information

A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Incentives Build Robustness in BitTorrent

Incentives Build Robustness in BitTorrent Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

A. Related Measurement Work on Mesh-pull Streaming Systems

A. Related Measurement Work on Mesh-pull Streaming Systems Inferring Network-Wide Quality in P2P Live Streaming Systems Xiaojun Hei, Yong Liu and Keith W. Ross Department of Computer and Information Science Department of Electrical and Computer Engineering Polytechnic

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007

1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007 1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007 A Measurement Study of a Large-Scale P2P IPTV System Xiaojun Hei, Student Member, IEEE, Chao Liang, Student Member, IEEE, Jian Liang,

More information

White Paper. The Next Generation Video Codec Scalable Video Coding (SVC)

White Paper. The Next Generation Video Codec Scalable Video Coding (SVC) White Paper The Next Generation Video Codec Scalable Video Coding (SVC) Contents Background... 3 What is SVC?... 3 Implementations of SVC Technology: VIVOTEK as an Example... 6 Conclusion... 10 2 Background

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

CSCI-1680 CDN & P2P Chen Avin

CSCI-1680 CDN & P2P Chen Avin CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

Tranzeo s EnRoute500 Performance Analysis and Prediction

Tranzeo s EnRoute500 Performance Analysis and Prediction Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman

More information

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A

More information

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) December 16 th, 2015 Table of Contents 1. Purpose... 3 2. What a typical internet speed test measures....

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Quiz for Chapter 6 Storage and Other I/O Topics 3.10

Quiz for Chapter 6 Storage and Other I/O Topics 3.10 Date: 3.10 Not all questions are of equal difficulty. Please review the entire quiz first and then budget your time carefully. Name: Course: Solutions in Red 1. [6 points] Give a concise answer to each

More information

ADVANTAGES OF AV OVER IP. EMCORE Corporation

ADVANTAGES OF AV OVER IP. EMCORE Corporation ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Encrypting Network Traffic

Encrypting Network Traffic Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Differenciated Bandwidth Allocation in P2P Layered Streaming

Differenciated Bandwidth Allocation in P2P Layered Streaming Differenciated Bandwidth Allocation in P2P Layered Streaming Abbas Bradai, Toufik Ahmed CNRS-LaBRI University of Bordeaux- 5, Cours de la libération. Talence, 45 {bradai, tad} @labri.fr Abstract There

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications

Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications Keyur Parikh and Junius Kim Harris Broadcast Mason Ohio Abstract Increasingly, IP based networks are being used for

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

For More Information. Setting Bitrate Control and Keyframe Parameters

For More Information. Setting Bitrate Control and Keyframe Parameters Setting Bitrate Control and Keyframe Parameters Jan Ozer www.streaminglearningcenter.com @janozer jozer@mindspring.com/ 276-238-9135 For More Information! Most information derived from this book.! For

More information

WHITE PAPER. H.264/AVC Encode Technology V0.8.0

WHITE PAPER. H.264/AVC Encode Technology V0.8.0 WHITE PAPER H.264/AVC Encode Technology V0.8.0 H.264/AVC Standard Overview H.264/AVC standard was published by the JVT group, which was co-founded by ITU-T VCEG and ISO/IEC MPEG, in 2003. By adopting new

More information

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,

More information

Quality of Service Testing in the VoIP Environment

Quality of Service Testing in the VoIP Environment Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,

More information

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

IP Data Over Satellite To Cable Headends And A New Operation Model With Digital Store And Forward Multi-Media Systems

IP Data Over Satellite To Cable Headends And A New Operation Model With Digital Store And Forward Multi-Media Systems IP Data Over Satellite To Cable Headends And A New Operation Model With Digital Store And Forward Multi-Media Systems Paul Harr Wegener Communications ABSTRACT The success of the Internet has proved it

More information

Oracle Real Time Decisions

Oracle Real Time Decisions A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

A Network Control Plane for Massive Video Delivery

A Network Control Plane for Massive Video Delivery A Network Control Plane for Massive Video Delivery Giuseppe Cofano Politecnico di Bari, Dipartimento di Ingegneria Elettrica e dell Informazione, Via E. Orabona 4 70125 Bari, Italy - giuseppe.cofano@poliba.it

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

www.lirneasia.net Oct 2008 Annual price 256kbps Business Broadband connection Figure 2 Annual Price 2Mbps, 2km leased line connection Figure 1 4,500

www.lirneasia.net Oct 2008 Annual price 256kbps Business Broadband connection Figure 2 Annual Price 2Mbps, 2km leased line connection Figure 1 4,500 18, Annual Price 2Mbps, 2km leased line connection Figure 1 4,5 Annual price 256kbps Business Broadband connection Figure 2 USD 16, 14, 12, 1, 8, 6, 4, 2, Afghanistan Bangladesh Pakistan India Bhutan Sri

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Multimedia transmission in a managed P2P network: making sense?

Multimedia transmission in a managed P2P network: making sense? Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University

More information

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

Modeling an Agent-Based Decentralized File Sharing Network

Modeling an Agent-Based Decentralized File Sharing Network Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration

More information

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010 Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Network Coding for Large Scale Content Distribution

Network Coding for Large Scale Content Distribution Network Coding for Large Scale Content Distribution Christos Gkantsidis College of Computing Georgia Institute of Technology Atlanta, GA, 30332, USA Email: gantsich@cc.gatech.edu IEEE Infocom 2005 Pablo

More information

White paper. H.264 video compression standard. New possibilities within video surveillance.

White paper. H.264 video compression standard. New possibilities within video surveillance. White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles

More information

Application Note. Low Bandwidth Media Configuration V7.0

Application Note. Low Bandwidth Media Configuration V7.0 Application Note Low Bandwidth Media Configuration V7.0 INTRODUCTION... 3 Network Overview... 3 Wireless Wide Area Networks (Cellular)... 3 Satellite... 3 Onsight Solution Architecture... 4 ONSIGHT BANDWIDTH

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

A Digital Fountain Approach to Reliable Distribution of Bulk Data

A Digital Fountain Approach to Reliable Distribution of Bulk Data A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI Application: Software Distribution New release of

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

WHITE PAPER Personal Telepresence: The Next Generation of Video Communication. www.vidyo.com 1.866.99.VIDYO

WHITE PAPER Personal Telepresence: The Next Generation of Video Communication. www.vidyo.com 1.866.99.VIDYO WHITE PAPER Personal Telepresence: The Next Generation of Video Communication www.vidyo.com 1.866.99.VIDYO 2009 Vidyo, Inc. All rights reserved. Vidyo is a registered trademark and VidyoConferencing, VidyoDesktop,

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

Network Technologies

Network Technologies Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching

More information

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in

More information

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

NIELSEN'S LAW VS. NIELSEN TV VIEWERSHIP FOR NETWORK CAPACITY PLANNING Michael J. Emmendorfer and Thomas J. Cloonan ARRIS

NIELSEN'S LAW VS. NIELSEN TV VIEWERSHIP FOR NETWORK CAPACITY PLANNING Michael J. Emmendorfer and Thomas J. Cloonan ARRIS NIELSEN'S LAW VS. NIELSEN TV VIEWERSHIP FOR NETWORK CAPACITY PLANNING Michael J. Emmendorfer and Thomas J. Cloonan ARRIS Abstract Our industry is fully aware of Nielsen s Law of the maximum Internet service

More information

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds: Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

2013 Measuring Broadband America February Report

2013 Measuring Broadband America February Report 2013 Measuring Broadband America February Report A Report on Consumer Wireline Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau

More information

Giving life to today s media distribution services

Giving life to today s media distribution services Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of

More information

Emerging Wireless Technologies

Emerging Wireless Technologies Emerging Wireless Technologies A look into the future of wireless communications beyond 3G Forward: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information